CVE-2020-14610

7.6 HIGH

📋 TL;DR

This CVE-2020-14610 is a cross-site scripting (XSS) vulnerability in Oracle Applications Framework's file upload component. It allows authenticated attackers with low privileges to inject malicious scripts via HTTP, potentially compromising user sessions and data when victims interact with crafted content. Organizations running Oracle E-Business Suite 12.2.9 are affected.

💻 Affected Systems

Products:
  • Oracle E-Business Suite
Versions: 12.2.9
Operating Systems: All platforms running Oracle E-Business Suite
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Oracle Applications Framework component specifically for attachments/file upload functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal session cookies, credentials, or sensitive data from users, perform actions on their behalf, and potentially pivot to other systems through the compromised Oracle Applications Framework.

🟠

Likely Case

Attackers would use this to steal session cookies or credentials from authenticated users, leading to unauthorized access to business data and potential data manipulation.

🟢

If Mitigated

With proper input validation, output encoding, and Content Security Policy headers, the risk reduces to minimal even if the vulnerability exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated low-privilege access and user interaction (UI:R in CVSS).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply Oracle Critical Patch Update July 2020 or later

Vendor Advisory: https://www.oracle.com/security-alerts/cpujul2020.html

Restart Required: Yes

Instructions:

1. Download the appropriate patch from Oracle Support. 2. Apply the patch following Oracle's patching procedures. 3. Restart affected services. 4. Test functionality.

🔧 Temporary Workarounds

Implement Content Security Policy

all

Add CSP headers to restrict script execution sources

Add 'Content-Security-Policy' header with appropriate directives to web server configuration

Input Validation Filtering

all

Implement server-side validation for file upload content

Configure web application firewall rules to block suspicious upload patterns

🧯 If You Can't Patch

  • Restrict network access to Oracle E-Business Suite to trusted IPs only
  • Implement strong session management and regularly rotate session tokens

🔍 How to Verify

Check if Vulnerable:

Check Oracle E-Business Suite version and patch level via Oracle application administration tools

Check Version:

Check Oracle Applications Framework version via Oracle application administration interface

Verify Fix Applied:

Verify patch application through Oracle OPatch utility and test file upload functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual file upload patterns
  • Suspicious HTTP requests to attachment endpoints
  • Multiple failed upload attempts

Network Indicators:

  • HTTP requests with suspicious script tags in parameters
  • Unusual traffic to /OA_HTML/* endpoints

SIEM Query:

source="oracle-ebs" AND (uri_path="/OA_HTML/*" AND (param="*<script>*" OR param="*javascript:*"))

🔗 References

📤 Share & Export